default search action
International Journal of Computing, Volume 13
Volume 13, Number 1, 2014
- Keisuke Kato, Vitaly Klyuev:
Password Protection: End User Security Behavior. 8-16 - Christof Pieloth, Thomas R. Knösche, Burkhard Maess, Mirco Fuchs:
Online Distributed Source localization from EEG/MEG Data. 17-24 - Aleksandra Kawala-Janik, Jerzy Baranowski, Michal Podpora, Pawel Piatek, Mariusz Pelc:
Use of a Cost-Effective Neuroheadset Emotiv EPOC for Pattern Recognition Purposes. 25-33 - Vitaliy Pavlenko, Sergei Pavlenko, Viktor O. Speranskyy:
Noise Immunity Research for nonlinear dynamical Systems identification based on Volterra Model in frequency Domain. 34-41 - Agata Manolova, Krasimir Tonchev:
Study of two 3D Face Representation Algorithms using Range Image and Curvature-based Representations. 42-49 - Daniel Caspari, Mircea Strutu, Lucas Riedhammer, Uwe Grossmann:
Sensor based Algorithms for dead Reckoning: a Comparison of two Approaches for Smartphones. 50-60 - Viktor Artemenko:
Agent-based Modeling of the E-Learning Users' Behavior. 61-69
Volume 13, Number 2, 2014
- Yuriy P. Kondratenko, Volodymyr V. Korobko, Oleksiy V. Korobko, Oleksiy Moskovko:
Design of the fuzzy control System for the waste heat Utilization plants Driven by the thermoacoustic Engine. 88-96 - S. P. Malarvizhi, B. Sathiyabhama:
Enhanced Reconfigurable Weighted Association Rule Mining for Frequent Patterns of Web Logs. 97-105 - Ontje Helmich, Michael A. Herzog, Christian Neumann:
Seamless and Secure Integration of Socialmedia, E-portfolio and Alumn Services into University Information Architecture. 106-115 - Di Zhao:
Fast Solver for interior Point method of SVM Training by Parallel GMRES and HSS. 116-124 - Omar S. Sonbul, Alexander N. Kalashnikov:
Determining the Operating Distance of Air ultrasound Range finders: calculations and Experiments. 125-131 - Alexey Lagunov, Darina Lagunova, Irina Berdennikova:
Cognitive System of the Hepatorenal Syndrome Screening in Persons with Alcohol Abuse. 132-140
Volume 13, Number 3, 2014
- Bakhta Meroufel, Ghalem Belalem:
Abstraction Checkpointing Levels: Problems and solutions. 158-169 - Sergey A. Subbotin:
The Instance Selection method for Neuro-fuzzy Model synthesis. 170-175 - Hanna Balakhontseva, Jürgen Sieck:
Web-Server Application for Fast and robust Recognition of Exhibits in the Museum. 176-182 - Bohdan Y. Volochiy, Leonid Ozirkovskyi, Oleksandr Shkiliuk, Andriy Mashchak:
Technique of Construction Models of Behavior Algorithms of Radio Electronic Complex System using the Scheme of Paths method. 183-190 - Anbu Megelin star, Perumal Subburaj:
Wavelet shrinkage adaptive Histogram equalization for Medical Images. 191-196
Volume 13, Number 4, 2014
- Wolfgang Tysiak:
A Deeper Insight in some effects in Project Risk Management. 214-220 - Sergey D. Bushuyev, Magomed Zh. Ozdoyev:
Management of Projects for Organization Development on the Basis of Entrepreneurship. 221-226 - Bassam A. Hussein, Kristin H. J. Hafseld:
Impact of Conformity, Commitment and Management Style on an Information System Project. 227-239 - Igor Kononenko, Anna Kharazii:
The Methods of Selection of the Project Management Methodology. 240-247 - Carsten Wolff, Burkhard Igel, Uwe Lauschner:
A Structured Process for Transferring Academic Research into Innovation Projects - Pimes Case Study. 248-256 - Anatoliy J. Gaida, Tigran G. Grigorian, Yuriy N. Kharitonov, Volodymyr K. Koshkin:
The Project Management of water supply complexes Reconstruction on the Basis of Decision Support Systems. 257-263 - Marian Turek, Adam Sojda:
A fuzzy Pay-off method for Real option Valuation in determination of Mining Enterprise Value. 264-270
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.